yuvadm / greenpassLinks
Signature verification for the Green Pass (התו הירוק)
☆38Updated 3 years ago
Alternatives and similar repositories for greenpass
Users that are interested in greenpass are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 years ago
- ☆364Updated last year
- Preimage attack against NeuralHash 💣☆670Updated 2 years ago
- a command line tool that let you express commands in natural language using openai api..☆39Updated 4 months ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆458Updated 3 years ago
- A pure Python cleanroom implementation of libmagic, with instrumented parsing from Kaitai struct and an interactive hex viewer☆358Updated 2 months ago
- Survivors submitted to various CodeGuru Extreme competitions☆23Updated 2 years ago
- Rashi Plus Plus - the new Hebrew scripting language☆93Updated 4 years ago
- Exploration of x86-64 ISA using speculative execution.☆312Updated 4 years ago
- A simpler open-source version of JavaScript deobfuscator JSNice☆256Updated last year
- Compute NeuralHash for the given image☆133Updated 3 years ago
- 🚨 Pikud Ha'oref Alarm Tracking☆30Updated last year
- The first analysis framework for CPU microcode☆395Updated 2 years ago
- Code deobfuscation framework to simplify Mixed Boolean-Arithmetic (MBA) expressions☆316Updated 2 months ago
- Israel's Ministry of Health's COVID-19 Exposure Prevention App☆508Updated 2 years ago
- Symbolic execution for the XorShift128+ algorithm.☆106Updated 2 months ago
- Pipeline of a keylogging attack using just an audio signal and unsupervised learning.☆149Updated 2 years ago
- A list of open source reverse engineering tools with a focus on binary analysis☆219Updated last year
- gdbghidra - a visual bridge between a GDB session and GHIDRA☆321Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆142Updated 5 years ago
- Visualize the virtual address space of a Windows process on a Hilbert curve.☆301Updated 4 years ago
- An abstraction layer for constraint solvers.☆315Updated this week
- Whole-Program Reverse Engineering with GPT-3☆381Updated 2 years ago
- Decrypts encrypted books from Evrit to allow sending them to Kindle devices, Please don't use this to pirate books. העברה של ספרים מאפליק…☆32Updated last year
- A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)☆226Updated 5 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,356Updated 5 months ago
- Yes, it's a camel case.☆17Updated 5 years ago
- A Trace Explorer for Reverse Engineers☆1,438Updated last year
- A differential fuzzer for x86 decoders☆250Updated 8 months ago
- RIDL test suite and exploits☆356Updated 5 years ago